Increasing demands on producing environmentally friendly products are becoming a driving force for designing highly active catalysts. Thus, surfaces that efficiently catalyse the nitrogen reduction reactions are greatly sought in moderating air-pollutant emissions. This contribution aims to computationally investigate the hydrodenitrogenation (HDN) networks of pyridine over the γ-Mo2N(111) surface using a density functional theory (DFT) approach. Various adsorption configurations have been considered for the molecularly adsorbed pyridine. Findings indicate that pyridine can be adsorbed via side-on and end-on modes in six geometries in which one adsorption site is revealed to have the lowest adsorption energy (–45.3 kcal/mol). Over a nitrogen hollow site adsorption site, initial HDN steps proceed by the stepwise hydrogenation of pyridine into piperidine followed by the Langmuir–Hinshelwood mechanism. The obtained findings are the first to theoretically model the hydrogenation pathways of pyridine to form piperidine and then the hydrogenolysis of piperidine producing C5H12 and NH3 over metal nitride. These paved the way for further investigations to better understanding such an important nitrogen removal reactions.
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreA field-pilot scale slow sand filter (SSF) was constructed at Al-Rustamiya Sewage Treatment Plant (STP) in Baghdad city to investigate the removal efficiency in terms of Biochemical Oxygen Demand (BOD5), Chemical oxygen demand (COD), Total Suspended Solids (TSS) and Chloride concentrations for achieving better secondary effluent quality from this treatment plant. The SSF was designed at a 0.2 m/h filtration rate with filter area 1 m2 and total filter depth of 2.3 m. A filter sand media 0.35 mm in size and 1 m depth was supported by 0.2 m layer of gravel of size 5 mm. The secondary effluent from Al-Rustamiya STP was used as the influent to the slow sand filter. The results showed that the removal of BOD5, COD, TSS, and Chloride were
... Show More—This paper studies the control motion of a single link flexible joint robot by using a hierarchical non-singular terminal sliding mode controller (HNTSMC). In comparison to the conventional sliding mode controller (CSMC), the proposed algorithm (NTSMC) not only can conserve characteristics of the convention CSMC, such as easy implementation, guaranteed stability and good robustness against system uncertainties and external disturbances, but also can ensure a faster convergence rate of the systems states to zero in a finite time and singularity free. The flexible joint robot (FJR) is a two degree of freedom (2DOF) nonlinear and underactuated system. The system here is modeled as a fourth order system by using Lagrangian method. Based on t
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis study aimed to assess the possible association of oxytocin (OXT) gene with reproductive traits in two groups of Awassi ewes that differ in their reproductive potentials. Sheep were genotyped using PCR—single-stranded conformation polymorphism approach. Three genotypes were detected in exon 2, CC, CA, and AA, and a novel SNP was identified with a missense effect on oxytocin (c.188C > A → p.Arg55Leu). A significant (p < 0.01) association of p.Arg55Leu with the twinning rate was found as ewes with AA and CA genotypes exhibited, respectively a lower twinning ratio than those with the wild-type CC genotype. The deleterious impact of p.Arg55Leu was demonstrated by all in silico tools that were utilized to assess the effect of this varian
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThis study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network (ANN) and multiple linear regression (MLR). The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were received, giving a response rate of 89.74% for the research region. The collected data were processed using the ANN technique in MATLAB v20. The same database was utilized to
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More